Support Center

Back to home Submit a Ticket
  1. Solution home
  2. Features and Concepts

Features and Concepts

Profiles and Keys

  • Profiles and Keys: Overview
  • Linking your Atakama Mobile app

MofNop™

  • MofNop™ process
  • Authenticated metadata and the need to approve file renames

Security Groups & Secure Folders

  • Secure Folders & Security Groups: Overview
  • Using Atakama with cloud storage

Enterprise Configuration

  • Enterprise configuration: Overview
  • Configurable Application Blacklist
  • Integrations Guide
  • Adding a centralized logging server
  • What is an Atakama Administrator?
View all (10)

Sharing with Atakama

  • Sharing with Atakama: Overview
  • Connecting another computer to your existing Atakama folder
  • Setup network share location for multiple computers
  • Access Management
  • Access Request window
View all (8)

Secure File Transfer

  • Secure File Transfer (an alternative to emailing files): Overview
  • Requiring verification for all Secure File Transfer recipients

Secure Search

  • Secure Search: Overview

Intelligence Center

  • Intelligence Center End-User Setup Guide
  • Intelligence Center Admin Setup Guide
  • Intelligence Center installation guide for Windows
  • Intelligence Center installation guide for Linux
  • Intelligence Center User Guide
View all (9)

FAQ

  • Who can see or access my protected data?
  • Why do I need spare keys?
  • What if a device is lost, broken, or replaced?
  • Why do I need a friend, family member, or colleague to hold my spare key(s)?
  • Is Atakama a Cloud Storage provider?
View all (15)
Phone top Phone back 272-ATAKAMA

© Atakama LLC. All Rights Reserved.